SCADA Systems

Any type of securitybased systems is subjective to being targeted. SCADA is noexception. SCADA is supervisory control and data acquisition. According to the SCADASystems article, it refers to ICS (Industrial control systems) used to control infrastructureprocesses, facilitybased processes, or industrial processes. SCADA systems allow usersto make informative decisions to make sure the infrastructure and operations are safe. Oneof the biggest threats is access to software that wasn’t authorized for anyone to use. Thatcan include persons or computer viruses. Data access to networks that is sent to SCADAdevices is another threat. There is little to no security with sending data so whatever personthat sends it, has all control over it. VPN is an option that SCADA users believe will helpkeep the network protected, but at the same time there are ways to bypass the securitynetwork on SCADA devices.
To mitigate risks and to protect from cyber threats, organizations need to take on amore cautious approach that involves threat intelligence. To get a hold of threatintelligence, organizations can be more prepared and ahead of oncoming threats. They arealso able to understand the different strategies used by cybercriminals and put in placedifferent security measures.
Dixon, M. (2024, October 27). SCADA systems and Cyber Threats: A threat intelligenceapproach. CyberIntelInsights.com. https://www.cyberintelinsights.com/industries/scadasystemscyberthreatsthreat/
SCADA systems. SCADA Systems. (n.d.). https://www.scadasystems.net/
 
 

Leave a Reply

Your email address will not be published. Required fields are marked *